{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T04:45:55Z","timestamp":1762145155653,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_22","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"221-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identification of Corrupted Cloud Storage in Batch Auditing"],"prefix":"10.1007","author":[{"given":"Sooyeon","family":"Shin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seungyeon","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ateniece, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007, pp. 598\u2013609. ACM press (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"2","key":"22_CR2","first-page":"1","volume":"5","author":"WR Claycomb","year":"2014","unstructured":"Claycomb, W.R., Legg, P.A., Gollmann, D.: Guest editorial: emerging trends in research for insider threat detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 1\u20136 (2014)","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Kai, H., Chuanhe, H., Jinhai, W., Hao, Z., Xi, C., Yilong, L., Lianzhen, Z., Bin, W.: An efficient public batch auditing protocol for data security in multi-cloud storage. In: IEEE ChinaGrid Conference, pp. 51\u201356. IEEE press (2013)","DOI":"10.1109\/ChinaGrid.2013.13"},{"issue":"2","key":"22_CR4","first-page":"59","volume":"5","author":"F Kamm\u00fcller","year":"2014","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Invalidating Policies using Structural Information. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 59\u201379 (2014)","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"2","key":"22_CR5","first-page":"80","volume":"5","author":"B Lindauer","year":"2014","unstructured":"Lindauer, B., Glasser, J., Rosen, M., Wallnau, K.: Generating Test Data for Insider Threat Detectors. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 80\u201394 (2014)","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, L.: Privacy-preserving public auditing for data storage security in cloud computing. In: IEEE INFOCOM 2010, pp. 525\u2013533. IEEE Press, New York (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.-M., Wang, Q., Ren, K., Lou, W.: Privacy- preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"22_CR10","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: ACM Symposium Applied Computing, pp. 1550\u20131557. ACM press (2011)","DOI":"10.1145\/1982185.1982514"},{"issue":"12","key":"22_CR12","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G.-J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231\u20132244 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:50:09Z","timestamp":1569383409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}